Some of them worked for Iranian security companies ITSec Team, and Mersad Company.

The attacks – all DDoS attacks -started in 2011, a year after discovery of the Stuxnet worm, believed created by the U.S. and Israel, that sabotaged centrifuges used in the Iranian nuclear program.

In a press conference, Attorney General Loretta Lynch described the attacks as systematic and widespread.

According to the DoJ: Between late 2011 and mid-2013, the U.S. financial sector suffered a large-scale and coordinated campaign of distributed denial of service (DDoS) attacks. Through these attacks, the servers of 46 financial institutions were flooded with traffic over the course of 176 days – and as a result, online services were disrupted and hundreds of thousands of Americans were unable to access bank accounts online. The attacks threatened our economic well-being and our ability to compete fairly in the global marketplace – both of which are directly linked to our national security. And we believe that they were conducted with the sole purpose of undermining the targeted companies and damaging the online operation of America’s free market, Lynch said.

“For the purpose of carrying out the attacks, each group built and maintained their own botnets, which consisted of thousands of compromised computer systems owned by unwitting third parties that had been infected with the defendants’ malware, and subject to their remote command and control. The defendants and/or their unindicted co-conspirators then sent orders to their botnets to direct significant amounts of malicious traffic at computer servers used to operate the websites for victim financial institutions, which overwhelmed victim servers and disabled them from customers seeking to legitimately access the websites or their online bank accounts. Although the DDoS campaign caused damage to the financial sector victims and interfered with their customers’ ability to do online banking, the attacks did not affect or result in the theft of customer account data,” the DoJ stated.

Some of the banks attacked were: including JPMorgan Chase, Bank of America, Capital One and PNC Bank.

The attack against the water facility hit the back office for the Bowman Ave. Dam in Rye, N.Y., but the attackers failed to gain access to the dam controls because they were offline for maintenance, she said, according to reports. That attack has been interpreted as a trial run to work out how best to compromise the industrial control systems that open and close dams, valves in manufacturing systems, switches in electrical grids and the like.

Latest Videos

Hear from Invictus Games Sydney 2019 CEO, Patrick Kidd OBE and Head of Technology, @James-d-smith -share their insights on how they partnered with Unisys to protect critical data over an open, public WiFi solution.

With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.

According to new research conducted by the Ponemon Institute, Australia and New Zealand have the highest levels of data breaches out of the nine countries investigated. This was linked to heavy investment in security detection and an under-investment in security and vulnerability response capabilities

Copyright 2019 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.